25.8.20
This website uses cookies to ensure you get the best experience on our website. Learn more

OWASP Top 10: A5 - Broken Access Control

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Resource authorization occurs after successful authentication. Resources include objects such as files, folders, web apps, storage accounts, virtual machines, and so on. In this course, you'll learn about various resource access control models including MAC, DAC, and RBAC. Next, you'll examine how broken access control attacks occur. You'll then explore HTTP methods, as well as how to set file system permissions in Windows and Linux, assign permissions to code, and digitally sign a PowerShell script. Lastly, you'll learn about identify federation, how to execute broken access control attacks, and how to mitigate broken access control attacks.

Issued on

October 7, 2022

Expires on

Does not expire